Monero Transaction 0edb196e4713ca83e56dff718e332cbdebc389084fc1145d3addc0b4a9da36fd

Autorefresh is OFF

Tx hash: 0edb196e4713ca83e56dff718e332cbdebc389084fc1145d3addc0b4a9da36fd

Tx prefix hash: 7489621e57f01b6c45326c095362a251850ff1da9ef40bdc7011914f9e9986ea
Tx public key: fedd0aa572707569d6c7b502b8991d63a4d4558ec3c804b82e8f17ba772a04d3
Payment id: df45f7573a2a415eae1c546a5658e7085f9cb48d455d49ac956fdf1112c9d35b

Transaction 0edb196e4713ca83e56dff718e332cbdebc389084fc1145d3addc0b4a9da36fd was carried out on the Monero network on 2014-11-20 09:23:38. The transaction has 3008741 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1416475418 Timestamp [UTC]: 2014-11-20 09:23:38 Age [y:d:h:m:s]: 10:053:09:22:47
Block: 312964 Fee (per_kB): 0.010000000000 (0.017297297297) Tx size: 0.5781 kB
Tx version: 1 No of confirmations: 3008741 RingCT/type: no
Extra: 022100df45f7573a2a415eae1c546a5658e7085f9cb48d455d49ac956fdf1112c9d35b01fedd0aa572707569d6c7b502b8991d63a4d4558ec3c804b82e8f17ba772a04d3

5 output(s) for total of 13.090000000000 xmr

stealth address amount amount idx tag
00: 64dd21e8c0ffb3c5bcd4e60fd530581a45d21d027a393050bc9eb54d42338f54 0.090000000000 123240 of 317822 -
01: f1e74d753c20f4b0ca805585978d2eb3459f40a4f3165de4dad364becf49288b 0.300000000000 341978 of 976536 -
02: 8c720158d296d7d08ff986f81d3e79420cbc5d1b3998e2bca7314e39b5755ca8 0.700000000000 205313 of 514467 -
03: f9da853b5d73e1e89315c3d9d6eafead5145c0402ae5039c6da98385a5de410e 6.000000000000 89212 of 207703 -
04: 3691d3277e4a2c3e19dd636befb321866b994fa1d8867ab040ea7a7ee26ade60 6.000000000000 89213 of 207703 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-11-19 13:14:07 till 2014-11-20 06:09:53; resolution: 0.00 days)

  • |________________________________________________________________________________________________________________________________________________________________*_________|
  • |__________*_______________________________________________________________________________________________________________________________________________________________|
  • |______________________________________________________________________________________________________________*___________________________________________________________|

3 inputs(s) for total of 13.100000000000 xmr

key image 00: 616da6a09c380647480cfdb14ab467ccea3370ac76424965b7954f20c5932e30 amount: 0.100000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 0699157d3b7afad557a20fbfd34982c75e1142001194ba024520a99ecb5c6cbf 00312680 0 0/4 2014-11-20 05:09:53 10:053:13:36:32
key image 01: 0d30139ab46b1986385da3911a3547633fcd15e7e9fb6137488d73a77968b341 amount: 3.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 1a4a6681674443f34f07bdb26abc6e8e5637eed219d337531bd4b5cea6f72012 00311878 1 1/6 2014-11-19 14:14:07 10:054:04:32:18
key image 02: edc8c171b168e420089c266e02cf1bdb9bfecb1b35d55d057d6559fa7cb550b9 amount: 10.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: 613bfb543d299c32f7f5151953aa0ba5812a90e15bb532dca0475dfac06ec77c 00312397 0 0/3 2014-11-20 00:13:15 10:053:18:33:10
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 100000000000, "key_offsets": [ 640474 ], "k_image": "616da6a09c380647480cfdb14ab467ccea3370ac76424965b7954f20c5932e30" } }, { "key": { "amount": 3000000000000, "key_offsets": [ 145077 ], "k_image": "0d30139ab46b1986385da3911a3547633fcd15e7e9fb6137488d73a77968b341" } }, { "key": { "amount": 10000000000000, "key_offsets": [ 362992 ], "k_image": "edc8c171b168e420089c266e02cf1bdb9bfecb1b35d55d057d6559fa7cb550b9" } } ], "vout": [ { "amount": 90000000000, "target": { "key": "64dd21e8c0ffb3c5bcd4e60fd530581a45d21d027a393050bc9eb54d42338f54" } }, { "amount": 300000000000, "target": { "key": "f1e74d753c20f4b0ca805585978d2eb3459f40a4f3165de4dad364becf49288b" } }, { "amount": 700000000000, "target": { "key": "8c720158d296d7d08ff986f81d3e79420cbc5d1b3998e2bca7314e39b5755ca8" } }, { "amount": 6000000000000, "target": { "key": "f9da853b5d73e1e89315c3d9d6eafead5145c0402ae5039c6da98385a5de410e" } }, { "amount": 6000000000000, "target": { "key": "3691d3277e4a2c3e19dd636befb321866b994fa1d8867ab040ea7a7ee26ade60" } } ], "extra": [ 2, 33, 0, 223, 69, 247, 87, 58, 42, 65, 94, 174, 28, 84, 106, 86, 88, 231, 8, 95, 156, 180, 141, 69, 93, 73, 172, 149, 111, 223, 17, 18, 201, 211, 91, 1, 254, 221, 10, 165, 114, 112, 117, 105, 214, 199, 181, 2, 184, 153, 29, 99, 164, 212, 85, 142, 195, 200, 4, 184, 46, 143, 23, 186, 119, 42, 4, 211 ], "signatures": [ "6e08d47240774301a536577bc146c6892fc53935eb1d4af3e3d604a65c31550eb3d3d9c19e1c3f9acaae51dc2a3ab60f81ae37c1d1b4049310c1d17f2a56b10b", "eaa9c9eb3e92896fc9281f4dae281e01b67cf80d9f8be4f12ce732e29d440b0c723c3f4c9b09dd8f96d7d67b8f49f3e8920614c64490a9fef6d9167324b20e00", "48275738f54e26720e6a9464c2aadba5034b3b480501c89449b471b65c6f1500c145552277f7845158755781afe1580549e6ac87e245ff80ef1f6f9424fd6d09"] }


Less details
source code | moneroexplorer